WinPwn
Penetration tester
Automates reconnaissance and exploitation on Windows systems for internal penetration testing and AD security auditing.
Automation for internal Windows Penetrationtest / AD-Security
3k stars
82 watching
517 forks
Language: PowerShell
last commit: 10 months ago
Linked from 1 awesome list
adsecurityautomationexploitationpentest-toolpentestingpowershellpowersploitprivilege-escalationreconredteam
Related projects:
Repository | Description | Stars |
---|---|---|
hackplayers/evil-winrm | A tool providing a custom WinRM interface for post-exploitation purposes in Windows environments | 4,537 |
theofficialflow/pppwn | Exploits a known vulnerability in the PlayStation 4 to execute arbitrary code | 2,604 |
fuzzysecurity/powershell-suite | A collection of PowerShell utilities designed to bridge ontological gaps and facilitate low-level Windows API access for specific use cases. | 2,613 |
samratashok/nishang | A framework and collection of scripts for utilizing PowerShell in offensive security and penetration testing. | 8,799 |
manisso/fsociety | A comprehensive collection of hacking tools and scripts for penetration testing and vulnerability assessment | 10,637 |
kevin-robertson/inveigh | A .NET-based tool for conducting spoofing attacks and hash/credential captures in network protocols. | 2,555 |
itm4n/privesccheck | A PowerShell script that checks for local privilege escalation vulnerabilities on Windows systems. | 2,976 |
kgretzky/evilginx2 | A tool used to create phishing attacks bypassing security measures | 10,924 |
owasp/nettacker | Automated tool for identifying vulnerabilities and gathering information about network services and systems. | 3,618 |
mitmproxy/mitmproxy | An interactive HTTP proxy that can intercept and inspect HTTP/1, HTTP/2, and WebSocket traffic for testing and debugging purposes. | 36,838 |
epinna/weevely3 | A web-based tool for post-exploitation purposes that provides a shell and various administrative tools to interact with compromised systems remotely. | 3,200 |
integration-it/active-directory-exploitation-cheat-sheet | A comprehensive guide to exploiting and enumerating Windows Active Directory environments through PowerShell | 2,483 |
trustedsec/unicorn | A tool for using a PowerShell downgrade attack and injecting shellcode into memory. | 3,736 |
rogandawes/p4wnp1 | A customizable USB attack platform utilizing a low-cost single-board computer for remote shell access and device control. | 4,038 |
rogandawes/p4wnp1_aloa | A flexible platform for testing and exploiting physical systems | 3,775 |